21. EDGECRYPT ENCRYPTION ALGORITHM FOR

advertisement
Proceedings of the International Conference “Embedded Electronics and
Computing Systems(EECS)” 29-30 July, 2011 by S K R engineering
COLLEGE,CHENNAI-600123
EDGECRYPT ENCRYPTION ALGORITHM FOR MEDICAL
IMAGE-A LOSSLESS APPROACH
V.D.Ambeth Kumar1, R.Preethika2, A.Muthuselvi3
1,2. Lecturer, Asst.Prof, CSE, Panimalar Engineering College, Chennai.
3. UG Student, CSE, Panimalar Engineering College, Chennai.
ABSTRACT
In this paper, we are
proposed that the topic related to
Encryption, you may beware about
the term Encryption. My paper
deals with a lossless Encryption
method for Encrypting Medical
Images using the Information
contain with in an Edge map.
Image Encryption is an
effective approach for providing
security and privacy protection for
Medical Images. This paper
introduced new lossless approaches,
called Edge Encrypt for Encrypting
Medical Images. This algorithm can
fully protect the selected objects (or)
regions within Medical Images (or)
the Entire Medical Images. This
algorithm can also Encrypt the other
types of Images such as gray Scale
Images (or) colour Images. It can
also be used for privacy protection
such as wireless medical network
and mobile medical services.
Keywords: Lossless Encryption,
EdgeCrypt, Medical Image.
INTRODUCTION
Medical
images
are
generated by using different
technologies of medical imaging for
many clinical applications to
diagnose or examine diseases. These
technologies include radiography,
Computed
Tomography
(CT),
Magnetic
Resonance
Imaging
(MRI), Photoacoustic imaging, and
many others. Medical images may
contain a large amount of private
and important information about
patients. Some of them may be
included in a patient’s medical
record along with text based
personal
information,
clinical
diagnosis and examination records.
They may be archived as digital
formats in the computer or
transmitted among hospitals or
doctors for various clinical services.
Some rapidly growing new clinical
services such as telemedicine and ehealth transmit medical information
over telephone or
networks.
Providing security of medical
images becomes an important issue
for hospitals and medical service
organizations. Image encryption is
an effective method to secure
medical images while preserving
their integrity.
Many
approaches
for
medical image encryption have been
developed in recent years. For
example
Meghdad Ashtiyani
(et al) [1]and two others proposed an
Encryption Scheme for Encryption
of Medical Images based on
combination of Scrambling & a
confusion chaotic cat map is used for
the scrambling the address of
Medical Image pixels. In order to
provide security for the scheme as
modified form of simplified version
of advanced Encryption standards is
introduced and applied.
The
modification is that we make use of
chaos for s-box design & replace it
with that of S-AES & it has all
cryptography characteristics and
requirement of S-AES. Hence the
main contribution of this work is that
we make use of chaos in both Image
diffusion of this work is that we
make use of chaos in both Image
diffusion and confusion parts. In
Proceedings of the International Conference “Embedded Electronics and
Computing Systems(EECS)” 29-30 July, 2011 by S K R engineering
COLLEGE,CHENNAI-600123
order to check the performance of
the
method
Experimental
Implementation has been done.K.C.
Rachshankar and two others [2]
Image Security has found a great
need in many applications where the
info which is in the form of Image is
to be protected from unauthorized
access. This is possible by
Encrypting the Image, then by
improving the security of the image,
there are several schemes for Image
Encryption that have been proposed.
These
schemes
produced
Randomness in the image and hence
the content is not visible. But
Encryption and decryption consume
a considerable amount of time hence
there is a need for an efficient
algorithm. In this paper we improve
the efficiency of the algorithm
through a region based selective
Image Encryption technique, which
provides the facility of selective
Encryption
and
selective
Reconstruction
of
images.
Koredianto Usman and two others
[3] describe the result of complete
investigation and utilization pixels
arrangement
and
Random
permutation to Encrypt the medical
image for transmission security. The
main objective is to obtain a high
speed computation process together
with high security compare to other
algorithm such as transform method
and traditional method. The pixels
arrangement and permutation does
not
need
any
mathematical
manipulation.
Their
feature
especially very useful for medical
image where the image can very big.
Tenting result using gray scale
image shows a good randomness and
quick compilation process. Zalia
Brahim
and
others
[4]
implemented
a
novels
selective Encryption image scheme
based on JPEG 2000 which Encrypts
only the code blocks corresponding
to some sensitive precincts. In order
to improve the security level we
introduced the permutation of code
blocks contributing in the selected
precincts. Symmetric Encryption
AES with CFB mode is used to
Encrypt swapped code blocks. The
reason
behind
combining
permutation
and
selective
Encryption is to minimize the
amount of procured data Encryption
ensuring
the
best
possible
degradation through the permutation.
PROPOSED METHOD
In this section, we introduce
a new algorithm, EdgeCrypt, to
encrypt medical images using an
edge
map.
The
underlying
foundation of the EdgeCrypt
algorithm is to encrypt medical
images via changing image data. It
obtains the edge map of the medical
image by applying a specific type of
edge detector such as Canny, or
Sobel, or Prewitt, or any other, with
a certain threshold value. The
algorithm then decomposes the
medical image into several binary bit
planes, encrypts all bit planes by
performing an XOR operation
between the edge map and each bit
plane, encrypts the edge map using a
random bit sequence generated from
the logic chaotic map, interleaves the
encrypted edge map among the
XORed bit planes, reverses the order
of all bit planes, and combines them
to obtain the final encrypted medical
images.The block diagram of the
EdgeCrypt algorithm is shown in
Fig. 1.
Proceedings of the International Conference “Embedded Electronics and
Computing Systems(EECS)” 29-30 July, 2011 by S K R engineering
COLLEGE,CHENNAI-600123
EDGE
DETECTOR
Threshold
Value
ORIGINAL
MEDICAL
IMAGE
EDGE MAP
+
+
BIT PLAN
XOR
BIT PLAN
+
RANDOM BIT
SEQUENCE
INVERSE OF
ALL BIT PLAN
LOGIC
CHAOTIC MAP
ENCRYPTED
MEDICAL IMAGE
Fig 1. Encryption method
In the decryption process, the
authorized users do not have to
know the type of the edge detector
and its threshold value to reconstruct
the original image because the edge
map has been sent to users along
with the encrypted image. However,
the edge map can be completely
recovered only by using the correct
security keys: the location to
interleave the edge map as well as
the initial condition x0 and
parameter r of the logic chaotic map.
The decryption process first
decomposes the encrypted image
into binary bit planes. It then
reverses the order of all bit planes
and extracts the edge map from the
bit planes. The edge map is
reconstructed using security keys.
The algorithm performs an XOR
operation between the edge map and
each bit plane and combines the
Proceedings of the International Conference “Embedded Electronics and
Computing Systems(EECS)” 29-30 July, 2011 by S K R engineering
COLLEGE,CHENNAI-600123
XORed bit planes to obtain the
reconstructed
medical
image.
Decrypt algorithm is shown in Fig.
2.
Initial
Parameter Y
Condition X
ENCRYPTED
MEDICAL IMAGE
LOGIC CHAOTIC
MAP
INVERSE
OF ALL BIT
PLAN
RANDOM BIT
SEQUENCE
+
+
BIT PLAN
+
XOR
BIT PLAN
EDGE MAP
EDGE
DETECTION
\
ORIGINAL MEDICAL
IMAGE
Fig 2. Decryption method
EXPERIMENT AND RESULTS
DISCUSSION
The EdgeCrypt algorithm has
been successfully implemented in
more than 16 medical images. Some
simulation examples are presented in
this section to show the performance
of the algorithm for medical image
encryption. A comparison is made
with the AES algorithm to show the
Proceedings of the International Conference “Embedded Electronics and
Computing Systems(EECS)” 29-30 July, 2011 by S K R engineering
COLLEGE,CHENNAI-600123
encryption
efficiency
of
the
EdgeCrypt algorithm. The algorithm
is also proved to be able to encrypt
the selective objects /regions and
other types of images. The
interleaved location of the edge map
in all examples in this section is the
between the first bit plane, which
contains the most significant bits of
all image pixels, and the second bit
plane which contains the second
most significant bits of image pixels.
Fig.3 gives an example of the MRI
image encryption. The encrypted
image in Fig.3 (c) is completely
different from the original MRI
brain image in Fig.3 (a). The
histogram in Fig.3 (g) shows the
nearly equal distribution of the pixel
values in encrypted image. This
makes the encrypted image difficult
to be broken by attacks.
The original image can be protected
with high level of security. This is
one of advantages of the presented
algorithm.The original image has
been completely reconstructed. The
reconstruction can be verified from
the reconstructed image in Fig.3(d)
and its histogram in Fig.3(h) because
both of them are exactly the same as
the original image. The edge map in
this example is generated by the
Sobel edge detector with threshold
0.5. It is encrypted by logic chaotic
map with the initial condition 0 x =
0.6 and the parameter r = 3.65 .
Fig. 3. MRI image encryption. (a) The original MRI image; (b) The edge map obtained by Sobel edge
detector with threshold 0.5; (c) The encrypted MRI image, (d) The reconstructed MRI image; (e) Histogram
of the original MRI image; (f) The encrypted edge map,x0=0.6, r=3.65 ; (g) Histogram of the encrypted MRI
image; (h) Histogram of the reconstructed MRI image.
CONCLUSION
In this paper, we have
introduced a new algorithm for
medical image encryption which
uses the edge map. The algorithm
encrypts
medical
images
by
combining four different processes
to change image data. The nearly
equal data distribution of the
encrypted medical image has been
obtained after several encryption
processes.
The users have flexibility to
choose any existing edge detector
and its threshold values for the
EdgeCrypt algorithm or interleave
the edge map between any two bit
planes. The security keys of the
EdgeCrypt algorithm have an
infinite
number
of
possible
combinations. This ensures the
Proceedings of the International Conference “Embedded Electronics and
Computing Systems(EECS)” 29-30 July, 2011 by S K R engineering
COLLEGE,CHENNAI-600123
unauthorized users have difficulty to
decode the encrypted medical
images. Thus, original medical
images are protected with a high
level of security.
Experimental examples have
demonstrated that the EdgeCrypt
algorithm is a lossless encryption
method and can fully encrypt
selected objects or regions within the
medical images or entire medical
images. The EdgeCrypt algorithm
can be used for real-time medical
applications such as wireless
medical networking and mobile
medical services. It can overcome
the plaintext attacks.
REFERENCES
[1]. M.Ashtiyani, P. M. Birgani, and
H. M. Hosseini, "Chaos-Based
Medical Image Encryption Using
Symmetric
Cryptography,"
in
Information and Communication
Technologies: From Theory to
Applications, 2008. ICTTA 2008.
3rd International Conference on,
2008, pp. 1-5.
[2]. Y. Ou, C. Sur, and K. Rhee,
"Region-Based Selective Encryption
for Medical Imaging," in Frontiers
in Algorithmics, 2007, pp. 62-73.
[3]. K. Usman, H. Juzoji, I.
Nakajima, S. Soegidjoko, M.
Ramdhani, T. Hori, and S. Igi,
"Medical Image Encryption Based
on Pixel Arrangement and Random
Permutation
for
Transmission
Security," in e-Health Networking,
Application and Services, 2007 9th
International Conference on, 2007,
pp. 244-247.
[4]. Z. Brahimi, H. Bessalah, A.
Tarabet, and M. K. Kholladi, "A new
selective encryption technique of
JPEG2000 codestream for medical
images transmission," in Systems,
Signals and Devices, 2008. IEEE
SSD 2008. 5th International MultiConference on, 2008, pp. 1-4.
Download